Commit Graph

8938 Commits

Author SHA1 Message Date
github-actions[bot]
ca7fa2ef7b
Merge master into staging-next 2021-03-23 18:20:01 +00:00
R. RyanTM
4552283352 pspg: 4.3.1 -> 4.4.0 2021-03-23 13:48:29 -04:00
Ryan Mulligan
2525aa43a0
Merge pull request #116949 from r-ryantm/auto-update/lokalise2-cli
lokalise2-cli: 2.6.3 -> 2.6.4
2021-03-23 07:07:01 -07:00
github-actions[bot]
963842fb19
Merge master into staging-next 2021-03-23 12:27:46 +00:00
zseri
a9ec3f7b66 digitemp: init at 3.7.2
This does not include digitemp_DS2490, as that seems to require libusb0.1,
which isn't in nixpkgs.
2021-03-23 18:29:35 +08:00
Emery Hemingway
ee80707159 Trim ehmry from some package maintainers
I prefer not to be associated with anything blockchain related.
2021-03-23 10:24:00 +01:00
R. RyanTM
90a9906637 libcpuid: 0.5.0 -> 0.5.1 2021-03-23 10:11:42 +01:00
github-actions[bot]
39e3812215
Merge master into staging-next 2021-03-23 06:18:02 +00:00
David Birks
ee7a7ffc30 microplane: 0.0.26 -> 0.0.28
Also switching from deps to go mod, since they made the change upstream.
2021-03-23 01:20:14 -04:00
Ryan Mulligan
444ca81faf
Merge pull request #117189 from r-ryantm/auto-update/goreleaser
goreleaser: 0.159.0 -> 0.160.0
2021-03-22 21:06:33 -07:00
Graham Christensen
7eda163eac
Merge pull request #115310 from mweinelt/grub2
grub: 2.0.4 -> 2.0.6-rc1
2021-03-22 22:34:14 -04:00
Martin Weinelt
97c52d5782
grub: 2.0.4 -> 2.0.6-rc1
Quoting from
https://lists.gnu.org/archive/html/grub-devel/2021-03/msg00007.html:

*******************************************************************************

CVE-2020-14372 grub2: The acpi command allows privileged user to load crafted
               ACPI tables when Secure Boot is enabled
CWE-184
7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

GRUB2 enables the use of the command acpi even when Secure Boot is signaled by
the firmware. An attacker with local root privileges to can drop a small SSDT
in /boot/efi and modify grub.cfg to instruct grub to load said SSDT. The SSDT
then gets run by the kernel and it overwrites the kernel lock down configuration
enabling the attacker to load unsigned kernel modules and kexec unsigned code.

Reported-by: Máté Kukri

*******************************************************************************

CVE-2020-25632 grub2: Use-after-free in rmmod command
CWE-416
7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

The rmmod implementation for GRUB2 is flawed, allowing an attacker to unload
a module used as dependency without checking if any other dependent module is
still loaded. This leads to an use-after-free scenario possibly allowing an
attacker to execute arbitrary code and by-pass Secure Boot protections.

Reported-by: Chris Coulson (Canonical)

*******************************************************************************

CVE-2020-25647 grub2: Out-of-bound write in grub_usb_device_initialize()
CWE-787
6.9/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

grub_usb_device_initialize() is called to handle USB device initialization. It
reads out the descriptors it needs from the USB device and uses that data to
fill in some USB data structures. grub_usb_device_initialize() performs very
little bounds checking and simply assumes the USB device provides sane values.
This behavior can trigger memory corruption. If properly exploited, this would
lead to arbitrary code execution allowing the attacker to by-pass Secure Boot
mechanism.

Reported-by: Joseph Tartaro (IOActive) and Ilja van Sprundel (IOActive)

*******************************************************************************

CVE-2020-27749 grub2: Stack buffer overflow in grub_parser_split_cmdline
CWE-121
7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

grub_parser_split_cmdline() expands variable names present in the supplied
command line in to their corresponding variable contents and uses a 1kB stack
buffer for temporary storage without sufficient bounds checking. If the
function is called with a command line that references a variable with a
sufficiently large payload, it is possible to overflow the stack buffer,
corrupt the stack frame and control execution. An attacker may use this to
circumvent Secure Boot protections.

Reported-by: Chris Coulson (Canonical)

*******************************************************************************

CVE-2020-27779 grub2: The cutmem command allows privileged user to remove
               memory regions when Secure Boot is enabled
CWE-285
7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

The GRUB2's cutmem command does not honor Secure Boot locking. This allows an
privileged attacker to remove address ranges from memory creating an
opportunity to circumvent Secure Boot protections after proper triage about
grub's memory layout.

Reported-by: Teddy Reed

*******************************************************************************

CVE-2021-3418 - grub2: GRUB 2.05 reintroduced CVE-2020-15705
CWE-281
6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

The GRUB2 upstream reintroduced the CVE-2020-15705. This refers to a distro
specific flaw which made upstream in the mentioned version.

If certificates that signed GRUB2 are installed into db, GRUB2 can be booted
directly. It will then boot any kernel without signature validation. The booted
kernel will think it was booted in Secure Boot mode and will implement lock
down, yet it could have been tampered.

This flaw only affects upstream and distributions using the shim_lock verifier.

Reported-by: Dimitri John Ledkov (Canonical)

*******************************************************************************

CVE-2021-20225 grub2: Heap out-of-bounds write in short form option parser
CWE-787
7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

The option parser in GRUB2 allows an attacker to write past the end of
a heap-allocated buffer by calling certain commands with a large number
of specific short forms of options.

Reported-by: Daniel Axtens (IBM)

*******************************************************************************

CVE-2021-20233 grub2: Heap out-of-bound write due to mis-calculation of
               space required for quoting
CWE-787
7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

There's a flaw on GRUB2 menu rendering code setparam_prefix() in the menu
rendering code performs a length calculation on the assumption that expressing
a quoted single quote will require 3 characters, while it actually requires
4 characters. This allow an attacker to corrupt memory by one byte for each
quote in the input.

Reported-by: Daniel Axtens (IBM)
2021-03-23 02:48:30 +01:00
Sandro
fd45ac69d3
Merge pull request #117251 from jhillyerd/chezmoi
chezmoi: 1.8.11 -> 2.0.3
2021-03-23 02:41:56 +01:00
github-actions[bot]
11ee0bf5d7
Merge master into staging-next 2021-03-23 00:40:24 +00:00
Michele Guerini Rocco
e0c05e18ae
Merge pull request #117267 from r-ryantm/auto-update/bdf2psf
bdf2psf: 1.201 -> 1.202
2021-03-22 23:40:52 +01:00
Sandro
2bb10a1617
Merge pull request #116776 from sternenseemann/fdtools-fix-gcc-clang
fdtools: set platforms to linux only
2021-03-22 21:39:40 +01:00
R. RyanTM
96b7afb496 bdf2psf: 1.201 -> 1.202 2021-03-22 19:10:36 +00:00
James Hillyerd
b9bb7add79 chezmoi: 1.8.11 -> 2.0.3 2021-03-22 10:02:15 -07:00
github-actions[bot]
feda7be375
Merge master into staging-next 2021-03-22 12:26:55 +00:00
Fabian Affolter
f2b936edf5
Merge pull request #117173 from r-ryantm/auto-update/disfetch
disfetch: 1.20 -> 1.21
2021-03-22 13:13:51 +01:00
Sandro
6f9ac9eb8a
Merge pull request #117184 from siraben/fet-sh-update
fet-sh: 1.8 -> 1.9
2021-03-22 12:23:17 +01:00
Ben Siraphob
9398fc3c27 profile-cleaner: expand platforms to all 2021-03-22 15:56:00 +07:00
Ben Siraphob
4eda69a8ec kargo: expand platforms to all 2021-03-22 15:55:48 +07:00
Ben Siraphob
8e86eec6de pdf-parser: expand platforms to all 2021-03-22 15:55:34 +07:00
Ben Siraphob
55ce4c9b03 rmtrash: use stdenvNoCC 2021-03-22 15:47:11 +07:00
R. RyanTM
c7766c5733 goreleaser: 0.159.0 -> 0.160.0 2021-03-22 08:46:13 +00:00
Ben Siraphob
b773fd7e2a fet-sh: 1.8 -> 1.9 2021-03-22 15:20:59 +07:00
R. RyanTM
c1f24ffe09 disfetch: 1.20 -> 1.21 2021-03-22 06:40:35 +00:00
github-actions[bot]
226884645e
Merge master into staging-next 2021-03-22 00:45:52 +00:00
Sandro
dc67e73544
Merge pull request #116650 from r-ryantm/auto-update/rpi-imager
rpi-imager: 1.5 -> 1.6
2021-03-22 00:57:13 +01:00
Sandro
a36820e437
Merge pull request #116226 from r-ryantm/auto-update/upterm
upterm: 0.5.2 -> 0.6.5
2021-03-22 00:43:40 +01:00
Sandro
64fefe03d5
Merge pull request #116790 from mredaelli/handlr
handlr: init at 0.5.0
2021-03-22 00:24:31 +01:00
github-actions[bot]
b0455cafa7
Merge master into staging-next 2021-03-21 06:17:15 +00:00
zowoq
9832a6fa5f miniserve: 0.11.0 -> 0.12.0
https://github.com/svenstaro/miniserve/releases/tag/v0.12.0
2021-03-21 16:06:49 +10:00
Ryan Mulligan
42ad5a6636
Merge pull request #115618 from r-ryantm/auto-update/silicon
silicon: 0.4.0 -> 0.4.1
2021-03-20 19:56:12 -07:00
Ryan Mulligan
770f01c278
Merge pull request #116398 from r-ryantm/auto-update/code-minimap
code-minimap: 0.5.0 -> 0.5.1
2021-03-20 19:41:55 -07:00
Martin Weinelt
ec8267c539
Merge branch 'master' into staging-next 2021-03-21 02:22:36 +01:00
Fabian Affolter
ef5d88f081 past-time: init at 0.2.1 2021-03-21 01:04:23 +01:00
Sandro
530f854ba2
Merge pull request #116986 from fabaff/speedtest-cli
librespeed-cli: init at 1.0.7
2021-03-20 19:57:51 +01:00
github-actions[bot]
933682b533
Merge master into staging-next 2021-03-20 18:19:30 +00:00
Sandro
b9000499b7
Merge pull request #116314 from pacien/hidrd-init
hidrd: init at unstable-2019-06-03
2021-03-20 16:28:07 +01:00
Frederik Rietdijk
72aa2d1f78
Merge pull request #115678 from veprbl/pr/coreutils_tests
coreutils: enable tests for non-standard store path
2021-03-20 09:06:40 +01:00
github-actions[bot]
11187b30ca
Merge staging-next into staging 2021-03-20 06:21:50 +00:00
Sandro
0f53fe275e
Merge pull request #116972 from fabaff/boltbrowser
boltbrowser: init at 2.0
2021-03-20 03:33:47 +01:00
Fabian Affolter
12ebccaf38 librespeed-cli: init at 1.0.7 2021-03-19 23:40:37 +01:00
Fabian Affolter
86c2d1bf05 boltbrowser: init at 2.0 2021-03-19 22:18:41 +01:00
github-actions[bot]
6e3a55e059
Merge staging-next into staging 2021-03-19 18:19:40 +00:00
R. RyanTM
d09c94d212 lokalise2-cli: 2.6.3 -> 2.6.4 2021-03-19 17:40:25 +00:00
Frederik Rietdijk
1ecb97eae9 Merge master into staging-next 2021-03-19 18:17:01 +01:00
sternenseemann
00cecf2731 skawarePackages: 2021-02 release
Includes the following version changes:

- skalibs: 2.10.0.1 -> 2.10.0.2
- execline: 2.7.0.0 -> 2.8.0.0
- s6-networking: 2.4.0.0 -> 2.4.1.0
- s6-linux-init: 1.0.6.0 -> 1.0.6.1
- s6: 2.10.0.0 -> 2.10.0.2

Upstream maintainer notes:

------------------------------------------------------------

Mon, 15 Feb 2021 19:50:14 +0000

Hello,

New versions of some of the skarnet.org packages are available.

skalibs-2.10.0.2: bugfixes
execline-2.8.0.0: major version bump, but few and low-impact changes
s6-2.10.0.2: bugfixes
s6-linux-init-1.0.6.1: bugfixes
s6-networking-2.4.1.0: minor version bump

Some details:

* execline-2.8.0.0
  ----------------

- The if program now propagates its child's exit code by default if it
exits.
- The backtick program's -i behaviour (exit on child failure or
presence of a null character in its output) is now the default. Other
behaviours in case of child failure can be obtained via -I, -x or -D
options; -x is the new one.
- These changes are compatible with all the common uses of if and
backtick, but break compatibility in edge cases, which is why a
major version bump is required. This has nothing in common with the
previous major version bump, which had massive changes all over the
place; this one should go smoothly, and will only impact very specific
uses of backtick.

execline now has man pages, thanks to the untiring flexibeast!
The repository can be found here:

https://github.com/flexibeast/execline-man-pages

Please allow some time for the man pages to be updated to reflect
the current HTML documentation. Currently, the man pages document
execline-2.7.0.1; they are accurate for 2.8.0.0 except for the if and
backtick changes.

* s6-linux-init-1.0.6.1
  ---------------------

- Bugfixes.
- When s6-linux-init is built with utmps, the default utmp user for
s6-linux-init-maker was set to "utmp". That was a bug: now, by default,
s6-linux-init-maker does not create the utmp services if the -U option
is not given. If you used s6-linux-init-maker without the -U option
and still need the utmps services, you should explicitly set "-U utmp".

https://skarnet.org/software/s6-linux-init/
git://git.skarnet.org/s6-linux-init

* s6-networking-2.4.1.0
  ---------------------

- Bugfixes (nothing security-related).
- It is now possible to define a maximum amount of time spent in the
TLS handshake no matter how s6-networking has been built. (The -K
option has been implemented for the libtls backend.)
- When SNI has been required, the TLS-related binaries now export
the SSL TLS SNI SERVERNAME option to their application; the variable
contains the relevant server name.

https://skarnet.org/software/s6-networking/
git://git.skarnet.org/s6-networking

s6-networking has man pages as well:
https://github.com/flexibeast/s6-networking-man-pages

Enjoy,
Bug-reports welcome.

--
Laurent

------------------------------------------------------------

Copied from: http://skarnet.org/cgi-bin/archive.cgi?1:mss:1535:202102:lpehbljhhcpaopbnkkbf
2021-03-19 13:51:47 +01:00